Terrorism, Security, and Computation
David Wright and Others
Series • 10 Books • Computers & Internet
Anomaly Detection Principles and Algorithms
Kishan G. Mehrotra, Chilukuri K. Mohan & HuaMing Huang
Violence in Nigeria
Patricia Taft & Nate Haken
Foreign Information Manipulation and Interference
David Wright
Machine Learning Techniques to Predict Terrorist Attacks
Laura Mostert, Roy Lindelauf, Chiara Pulice, Marnix Provoost, Priyanka Amin & V.S. Subrahmanian
Discovering Hidden Gems in Foreign Languages
M.D. Miller
Detecting Trust and Deception in Group Interaction
V. S. Subrahmanian, Judee K Burgoon & Norah E. Dunbar
A Machine Learning Based Model of Boko Haram
V. S. Subrahmanian, Chiara Pulice, James F. Brown & Jacob Bonen-Clark
Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges
Maurizio Martellini & Andrea Malizia
The Global Cyber-Vulnerability Report
V.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras & Aditya Prakash
Indian Mujahideen
V.S. Subrahmanian, Aaron Mannes, Animesh Roul & R.K. Raghavan